Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
There are case-based recommender systems that generate personalized recommendations for users exploiting the knowledge contained in past recommendation cases. These systems assume ...
Enterprise Application Integration (EAI) techniques are today widely adopted to build Enterprise Information Systems. Moreover the increasing reliability of tools and techniques s...
Abstract--We present a novel tracking method for effectively tracking objects in structured environments. The tracking method finds applications in security surveillance, traffic m...
The difficulty of maintaining very large software systems is becoming more widely acknowledged. One of the primary problems is the need to access information about a complex and e...
Premkumar T. Devanbu, Peter G. Selfridge, Bruce W....